Please enable JavaScript.
Coggle requires JavaScript to display documents.
Protocols - Coggle Diagram
Protocols
It Security
Procedures put in place in relation to the appropriate and secure use of IT equipment and software. IT security protocols should cover : Unauthorised use and Inappropriate use.
-
-
-
-
-
-
Employment
-
Being employed would be like having a shop at a food shop, you get paid for the work you do there, or by how long you work there.
Checking
-
They're checked by a Manager, A Solicitor, A Proof reader, and an Agency.